• English
    • español
  • English 
    • English
    • español
  • Login
View Item 
  •   Home
  • Artículos científicos
  • Pregrado
  • Facultad de Ingeniería
  • Ingeniería de Sistemas de Información
  • View Item
  •   Home
  • Artículos científicos
  • Pregrado
  • Facultad de Ingeniería
  • Ingeniería de Sistemas de Información
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of UPCCommunitiesTitleAuthorsAdvisorIssue DateSubmit DateSubjectsThis CollectionTitleAuthorsAdvisorIssue DateSubmit DateSubjectsProfilesView

My Account

LoginRegister

Quick Guides

AcercaPolíticasPlantillas de tesis y trabajos de investigaciónFormato de publicación de tesis y trabajos de investigaciónFormato de publicación de otros documentosLista de verificación

Statistics

Display statistics

Maturity model for data leakage security protocols in telecommunications companies applying the NIST framework

  • CSV
  • RefMan
  • EndNote
  • BibTex
  • RefWorks
Average rating
 
   votes
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item. When enough users have cast their vote on this item, the average rating will also be shown.
Star rating
 
Your vote was cast
Thank you for your feedback
Authors
Leon, Solis
Joel, Brian
Jara, Di Paola
Giovanni, Renzo
Cornejo, Copaja
Nivaldo, Richard
Issue Date
2023-01-01
Keywords
evaluation
maturity model
NIST
response protocols

Metadata
Show full item record
Publisher
Institute of Electrical and Electronics Engineers Inc.
Journal
Proceedings of the 2023 IEEE 30th International Conference on Electronics, Electrical Engineering and Computing, INTERCON 2023
URI
http://hdl.handle.net/10757/673091
DOI
10.1109/INTERCON59652.2023.10326098
Abstract
Attacks on information security and data leaks in telecommunications companies in Peru cause considerable losses both financially and in terms of social reputation. For this reason, response protocols have been implemented to deal with these situations. However, the mere implementation and development of these protocols is not enough to effectively prevent or counter attacks. Therefore, a technological solution is proposed that combines a maturity assessment model for protocols and a reporting system that provides information on the current level and possible improvements that can be applied to the assessed protocols. The project aims to reduce attacks on companies in the telecommunications sector and at the same time enable them to assess the state of their protocols in terms of cybersecurity, giving them greater insight into possible situations that could result from protocol misuse. To validate the project, 4 cybersecurity experts were involved, who have used it for a given period to obtain sufficient information to offer their opinion. At the end of the period of use, a form was sent to them to evaluate the level of satisfaction with the project, using the indicators that were established. The final level of satisfaction obtained was 81.39%, which indicates that the project has been successful according to the evaluation of the security experts.
Type
info:eu-repo/semantics/article
Rights
info:eu-repo/semantics/embargoedAccess
Language
eng
ae974a485f413a2113503eed53cd6c53
10.1109/INTERCON59652.2023.10326098
Scopus Count
Collections
Ingeniería de Sistemas de Información

entitlement

 

DSpace software (copyright © 2002 - 2025)  DuraSpace
Quick Guide | Contact Us
Alicia
La Referencia
Open Repository is a service operated by 
Atmire NV
 

Export search results

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.